General

  • Target

    ed8e6aa09808a65f80b97ddf542f17c4_JaffaCakes118

  • Size

    155KB

  • Sample

    240920-pb32bawcmj

  • MD5

    ed8e6aa09808a65f80b97ddf542f17c4

  • SHA1

    696f094813dd77cb86652e4dc522a1c37d019e30

  • SHA256

    ba16a6fbe9cffddd217b697a158eda111d85a3ca6ad0c1a350340a554d22520a

  • SHA512

    63bd4da5853fd730e8a53010411aa4b1ce597e38c56de39ca1145290f572de780c331f787db5eb5271b4324b5051805af82f26ac274e5f0af7a600062180d1d4

  • SSDEEP

    1536:gURA+F6URA+Fhrdi1Ir77zOH98Wj2gpngd+a9AxQIY0y+Wbuw:frfrzOH98ipgYxDH7Auw

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://qstride.com/img/1W/

exe.dropper

http://syracusecoffee.com/customer/i/

exe.dropper

http://shahrakyar.com/cms/3e/

exe.dropper

http://vuatritue.com/wp-admin/FkX/

exe.dropper

http://glafka.com/wp-content/2L7/

exe.dropper

http://rovrooftiles.com/wp-includes/nDP/

exe.dropper

http://paulospainting.com/wp-includes/7k/

Targets

    • Target

      ed8e6aa09808a65f80b97ddf542f17c4_JaffaCakes118

    • Size

      155KB

    • MD5

      ed8e6aa09808a65f80b97ddf542f17c4

    • SHA1

      696f094813dd77cb86652e4dc522a1c37d019e30

    • SHA256

      ba16a6fbe9cffddd217b697a158eda111d85a3ca6ad0c1a350340a554d22520a

    • SHA512

      63bd4da5853fd730e8a53010411aa4b1ce597e38c56de39ca1145290f572de780c331f787db5eb5271b4324b5051805af82f26ac274e5f0af7a600062180d1d4

    • SSDEEP

      1536:gURA+F6URA+Fhrdi1Ir77zOH98Wj2gpngd+a9AxQIY0y+Wbuw:frfrzOH98ipgYxDH7Auw

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks